- Energy Efficient Wireless Sensor Networks
- Mobile Ad Hoc Networks
- Security in Wireless Sensor Networks
- Opportunistic and Delay-Tolerant Networks
- IoT and Edge/Fog Computing
- Software-Defined Networks and 5G
- Network Security and Intrusion Detection
- IPv6, Mobility, Handover, Networks, Security
- Caching and Content Delivery
- Vehicular Ad Hoc Networks (VANETs)
- Energy Harvesting in Wireless Networks
- Network Traffic and Congestion Control
- Blockchain Technology Applications and Security
- Cryptography and Data Security
- Context-Aware Activity Recognition Systems
- Cloud Data Security Solutions
- Wireless Communication Networks Research
- Cooperative Communication and Network Coding
- Wireless Networks and Protocols
- Underwater Vehicles and Communication Systems
- Mobile Agent-Based Network Management
- Internet of Things and Social Network Interactions
- Advanced Malware Detection Techniques
- Internet Traffic Analysis and Secure E-voting
- Wireless Body Area Networks
Samsung (South Korea)
2025
Jeonbuk National University
2013-2023
Chonbuk National University Hospital
2010-2022
Sungkyunkwan University
2021-2022
Korea Institute of Science & Technology Information
2013
University of Newcastle Australia
2005
The growing demand for human-independent comfortable lifestyle has emboldened the development of smart home. A typical keenly intellective home includes many Internet things contrivances that engender processes and immensely colossal data to efficiently handle its users’ demands. This incrementing raises a plethora concern cognate system in terms scalability, efficiency, security. All these issues are tedious manage, existing studies lack granularity surmounting them. Considering such...
Predicting the time, location and magnitude of an earthquake is a challenging job as does not show specific patterns resulting in inaccurate predictions. Techniques based on Artificial Intelligence (AI) are well known for their capability to find hidden data. In case prediction, these models also produce promising outcome. This work systematically explores contributions made date prediction using AI-based techniques. A total 84 scientific research papers, which reported use techniques have...
The Internet of Things (IoT) integrates billions self-organized and heterogeneous smart nodes that communicate with each other without human intervention. In recent years, IoT based systems have been used in improving the experience many applications including healthcare, agriculture, supply chain, education, transportation traffic monitoring, utility services etc. However, node heterogeneity raised security concern which is one most complicated issues on IoT. Implementing measures,...
In this paper, a proper concept of kind photonic crystal fiber known as D-shaped PCF sensor based on SPR or Surface Plasmon Resonance phenomenon has been discussed. The analysis performed numerically using FEM Finite Element Method and PML (Perfectly Matched Layer) boundary conditions. Modal keeping the smallest mesh possible. main mechanism is interaction between core guided light beam metal layer surface that generates free electrons. proposed shows refractive index detection range...
Blockchain is attracting more and attention to its applicability in the fields of Internet Things (IoT). In particular, it able store data unalterable blocks, associated with secure peer-to-peer a growing problem transaction authorization industrial service provisioning applications. Moreover, facilitates decentralized (TX) validation distributed ledger. The underneath algorithm TX selection for may not be effective terms delay various services Because existing random-based or fee-based...
The IPv6 routing protocol for low power and lossy networks (RPL) was designed to satisfy the requirements of a wide range Internet Things (IoT) applications, including industrial environmental monitoring. In most scenarios, different from an ordinary environment, monitoring system under emergency scenarios needs not only periodically collect information sensing region, but also respond rapidly some unusual situations. system, particularly when event occurs in surge data generated by sensors...
Clustering is an effective way to prolong the lifetime of a wireless sensor network (WSN). The common approach elect cluster heads take routing and controlling duty, periodically rotate each head's role distribute energy consumption among nodes. However, significant amount dissipates due control messages overhead, which results in shorter lifetime. This paper proposes energy-centric cluster-based mechanism WSNs. To begin with, are elected based on higher ranks rank defined by residual...
The rapid development of the Internet Things (IoT) concept has promoted presence routing protocol for low power and lossy network (RPL). Unlike traditional applications, many applications envisioned IoT networks may have different sometimes conflicting requirements. In this context, underlying requires to provide quality service (QoS) multipurpose is inevitable. However, approach in RPL not efficient because default objective functions (OFs) rely on a single metric, which can result tradeoff...
The emergence of an array new wireless networks has led researchers to evaluate the prospect utilizing physical properties medium in order design secure systems. In this paper, layer secrecy performance a mixed radio frequency-free space optical (RF-FSO) system with variable gain relaying scheme is investigated presence eavesdropper. We assume that eavesdropper can wiretap transmitted confidential data from RF link only. It further assumed main and links are modeled as generalized Gamma (GG)...
In this paper, an asymmetric photonic crystal fiber (PCF) working on surface plasmon resonance (SPR) has been proposed and demonstrated using the wavelength interrogation method lower birefringence peak method. The sensor contains a D-shaped analyte channel that can detect unknown analytes within sensing range of 1.42–1.47 refractive index units (RIU) analytes. structural asymmetry induces orthogonal x y polarization modes. numerical investigations with finite element (FEM) reveal maximum...
Data/tasks of Industrial Internet Things (IIoT) are extremely private and valuable to computing. Edge computing facilitates IIoT services by offering platforms supportive facilities functionalities. However, the convergence intelligent edge has been held back need develop systems for maintaining security privacy. In this article, we propose a new framework securely confidentially sending, storing, tasks. This employs lightweight encryption scheme alongside modified ElGamal digital signature...
In this work, we examine the privacy and safety issues of Internet Things (IoT)-based Precision Agriculture (PA), which could lead to problem that industry is currently experiencing as a result Intellectual Property Theft (IPT). Increasing IoT-based information flow in PA will make system less secure if proper security mechanism not ensured. Shortly, IoT transform everyday lives with its applications. (IP) another important concept an intelligent farming system. If IP wise leaks, it damages...
Industry 4.0 refers to the fourth evolution of technology development, which strives connect people various industries in terms achieving their expected outcomes efficiently. However, resource management an network is very complex and challenging. To manage provide suitable resources each service, we propose a FogQSYM (Fog–-Queuing system) model; it analytical model for Fog Applications that helps divide application into several layers, then enables sharing effective way according...
Internet of Things (IoT) is expected to have a significant impact on city’s service provisioning and make smart city more accessible pragmatic since the deployment heterogeneous devices in each infrastructure cities increasing. So far, IPv6 routing protocol for low power lossy networks (RPL) considered fit IoT achieving network requirements. While RPL meets requirements quite well, there are some issues that need be addressed, such as adaptability dynamics. This issue significantly limits...
Improving quality of service (QoS) low power and lossy networks (LLNs) in Internet things (IoT) is a major challenge. Cluster-based routing technique an effective approach to achieve this goal. This paper proposes QoS-aware clustering-based (QACR) mechanism for LLNs Fog-enabled IoT which provides clustering, cluster head (CH) election, path selection technique. The clustering adopts the community detection algorithm that partitions network into clusters with available nodes' connectivity. CH...
The green industrial Internet of things (IIoT) is emerging as a new paradigm, which envisions the concept connecting different devices and reducing energy consumption. In multi-hop low power lossy network, resource-constrained node should aware its consumption while routing data packets. As part IoT, protocol for network (RPL) considered to be default standard. Recently, RPL has gained significant maturity, but still, optimization one main issues, because objective function (OF), makes...
An intelligent vehicle safety system can be constructed by exchanging emergency-related information between any unrelated vehicles, such as urgency stop, traffic accident, and obstacles. In the most of communication applications, an emergency message is propagated in form broadcasting. However, it causes a lot problems terms efficiency due to multi-hop propagation radio collision problems. This paper presents selective forwarding method assigning defer time based on number common neighbors....
This paper deals with detecting an anomalous traffic area based on its distribution and distance measurements.On such as flooding attack we should consider the packet attribute of traffic.In order to identify that traffic, compute entropy selected Mahalanobis between normal abnormal traffics.Chi-square test is used evaluate proposed method.Detection accuracy performance are analyzed using real network trace which consists mostly backscatter SYN from LANDER project.The result our method...
Efficient task and resource allocation techniques are critical to managing the relationships between components of cloud, fog, mist-assisted Internet Things networks. Fulfilling this function necessarily implicates concerns two affected groups, users, who prioritize cost-effectiveness latency, service providers, efficient cost-effective management. While there is no single solution that capable simultaneously wholly optimizing experiences both solutions ensure mutual satisfaction can be...